Which of the following can the administrator do to decrypt the file?

A security administrator at a company which implements key escrow and symmetric encryption
only, needs to decrypt an employee’s file. The employee refuses to provide the decryption key to
the file. Which of the following can the administrator do to decrypt the file?

A security administrator at a company which implements key escrow and symmetric encryption
only, needs to decrypt an employee’s file. The employee refuses to provide the decryption key to
the file. Which of the following can the administrator do to decrypt the file?

A.
Use the employee’s private key

B.
Use the CA private key

C.
Retrieve the encryption key

D.
Use the recovery agent



Leave a Reply to Rice Cancel reply5

Your email address will not be published. Required fields are marked *

18 + ten =


Danielle

Danielle

Since key escrow retrieves the private key, wouldn’t it be A?

Rice

Rice

“symmetric encryption only”. There is no private or public key pair.

Rice

Rice

c is correct answer

Rice

Rice

Please ignore this.

Rice

Rice

Sorry, this is a better explanation:
“Key escrow addresses the possibility that a third party may need to access keys. Under the conditions of key escrow, the keys needed to encrypt/decrypt data are
held in an escrow account and made available if that third party requests them. The third party in question is generally the government, but it could also be an
employer if an employee’s private messages have been called into question.”